Twitter | Pretraživanje | |
starPt
OraOraOraOra
1.894
Tweetovi
979
Pratim
79
Osobe koje vas prate
Tweetovi
starPt proslijedio/la je tweet
Dave dwizzzle Weston 5. velj
Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Min(Spark) Zheng 5. velj
finally, it comes! XNU ( kernel of iOS 13 and macOS 10.15) source code: new mitigation and new bypass. :-)
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Frank Denis 4. velj
Awesome LD_PRELOAD
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Doyensec 3. velj
Our first blog post of 2020 is out! Learn about how we discovered a heap overflow in the F-Secure Internet Gatekeeper, which leads to unauthenticated RCE
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Pavel Yosifovich 2. velj
Chapter 6 has been published!
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Aleksei 2. velj
I am starting a blog. First post is about the StarkWare Hash Challenge
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
InfoSect 2. velj
Pointer Compression in V8 and what it means for browser exploitation by
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Axel Souchet 31. sij
Yearly reminder that by is awesome sauce 👌
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
starlabs 31. sij
Some of the bugs in VirtualBox found by There are more to come. CVE-2019-2984 - CVE-2019-3002 - CVE-2019-3005 - CVE-2019-3026 - CVE-2019-3031 -
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
SandboxEscaper 31. sij
Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
j00ru//vx 30. sij
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Ronen Shustin 30. sij
Odgovor korisniku/ci @ronenshh
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
kmkz 29. sij
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
James Forshaw 30. sij
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Walied Assar 27. sij
Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Cyber Advising 26. sij
How a double-free bug in WhatsApp turns to RCE
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Root-Me 27. sij
Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Swissky 26. sij
Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Binni Shah 24. sij
Hypervisor From Scratch – Part 7 : Using EPT & Page-Level Monitoring Features : 6: Virtualizing An Already Running System : 5: Setting up VMCS & Running Guest Code : cc
Reply Retweet Označi sa "sviđa mi se"
starPt proslijedio/la je tweet
Ptrace Security GmbH 23. sij
Red Team Diary, Entry #3: Custom Malware Development (Establishing A Shell Through the Target’s Browser)
Reply Retweet Označi sa "sviđa mi se"